Font Size: a A A

Research Of Key Management For Wireless Sensor Networks

Posted on:2013-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:J Q PanFull Text:PDF
GTID:2248330395459959Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
As an emerging wireless communication network, Wireless Sensor Network has abroad application prospect, but in many circumstances it requires a higher securityguarantee. Key Management is the basis to ensure the secure communication of WirelessSensor Network. Owning to the computing power, communication and limited storageresources of Wireless Sensor Network, the traditional key management can not be appliedto it directly, so it will be greatly significant to take research on the key managementtechnology of Wireless Sensor Network.This paper focuses on the key management method for Wireless Sensor Network.Firstly, the characteristics of several dominant key management schemes are analyzed andsummarized; Secondly, with consideration of the limited computing power of nodes inWireless Sensor Network, this paper proposes a confirmed key management scheme basedon small-scale networks, achieving the purpose of network security, authentication ofnodes and update of keys; Thirdly, as the exiting random key pre-distribution program cannot achieve both high secure connectivity and high network invulnerability, this paperproposes a hash chain-based key management scheme for Wireless Sensor Network;Finally, an attack scheme and improvement methods specific to a key management schemeare proposed, taking the advantage of loopholes in the hash chain structure, the attack willmake the opponent get chain keys and derived keys more than expected, causing damagefor more secure communication path. The improved scheme overcomes the shortages ofthe original.The exploration on the key management of Wireless Sensor Network in this paper willbe of great theoretical significance for further research on the security of Wireless SensorNetwork.
Keywords/Search Tags:Wireless Sensor Network, SecurityKey Management, Attack Analysis
PDF Full Text Request
Related items